CVE-2025-5592

7.3 HIGH

📋 TL;DR

A critical buffer overflow vulnerability in FreeFloat FTP Server 1.0's PASSIVE command handler allows remote attackers to execute arbitrary code or crash the service. This affects all deployments of FreeFloat FTP Server 1.0 with the vulnerable component enabled. Attackers can exploit this without authentication over the network.

💻 Affected Systems

Products:
  • FreeFloat FTP Server
Versions: 1.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is in the PASSIVE command handler component; all standard installations are affected

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, or ransomware deployment

🟠

Likely Case

Service crash causing denial of service, with potential for RCE if exploit is weaponized

🟢

If Mitigated

Denial of service only if exploit attempts are blocked by network controls

🌐 Internet-Facing: HIGH - Remote, unauthenticated exploitation with public exploit available
🏢 Internal Only: HIGH - Same exploit works internally, could facilitate lateral movement

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit code is available, making exploitation straightforward for attackers

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: N/A

Vendor Advisory: N/A

Restart Required: No

Instructions:

No official patch available. Consider migrating to a maintained FTP server solution.

🔧 Temporary Workarounds

Disable PASSIVE mode

windows

Configure FreeFloat FTP Server to disable PASSIVE mode, forcing clients to use ACTIVE mode only

Edit server configuration to set passive mode = false

Network segmentation

windows

Restrict FTP server access to trusted networks only using firewall rules

Windows Firewall: New Inbound Rule blocking port 21 from untrusted networks

🧯 If You Can't Patch

  • Replace FreeFloat FTP Server with a maintained alternative like FileZilla Server, vsftpd, or ProFTPD
  • Implement strict network access controls and monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check if FreeFloat FTP Server 1.0 is installed and running on port 21

Check Version:

Check program files directory for FreeFloat FTP Server and version information

Verify Fix Applied:

Verify PASSIVE mode is disabled in configuration or server has been replaced

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed PASSIVE command attempts
  • Unusual buffer overflow errors in server logs
  • Server crash/restart events

Network Indicators:

  • Malformed PASSIVE commands with excessive data
  • Exploit pattern matching from public PoC

SIEM Query:

source="ftp_server.log" AND ("PASSIVE" AND "overflow" OR "crash")

🔗 References

📤 Share & Export